10/185 questions · Unlock full access
Q1

A financial services firm is developing a machine learning model to detect fraudulent transactions. The model requires training on a large dataset of customer transactions from multiple collaborating banks, none of which can share raw data directly due to privacy regulations. The model's accuracy is paramount, and it must be retrained frequently. Which Privacy Enhancing Technology (PET) would be the MOST appropriate solution for this scenario?

Q2

A rapidly scaling technology startup has just secured a new round of funding and plans to expand its operations into the European Union. The company has a flat organizational structure and has handled privacy on an ad-hoc basis so far. What is the MOST effective first step in establishing a formal privacy governance structure to support this growth and ensure compliance?

Q3Multiple answers

A healthcare organization is implementing its data retention policy, which requires that patient electronic health records (EHR) be securely deleted seven years after the patient's last interaction. Which technical controls are ESSENTIAL to enforce this policy effectively? (Select TWO).

Q4

A social media company is planning to launch a new feature that uses machine learning to analyze user-uploaded photos and automatically suggest tags based on detected objects, faces, and locations. This processing is not essential for the core service. According to the GDPR, which of the following is the PRIMARY trigger for conducting a Data Protection Impact Assessment (DPIA)?

Q5

A telehealth provider, 'CareConnect', is developing a new mobile application for remote patient monitoring. The application will collect real-time biometric data (heart rate, blood oxygen) from wearable IoT devices, patient-reported symptoms via a chatbot, and video consultation recordings. CareConnect's primary goals are to ensure patient trust, comply with HIPAA and GDPR, and implement robust Privacy by Design principles. The proposed architecture involves the mobile app sending all data directly to a monolithic backend application hosted in a public cloud. This backend processes the data, stores it in a single large database, and serves it to healthcare providers through a web portal. The CISO has raised concerns that this design creates significant privacy risks and lacks necessary controls for data segregation and minimization. As the lead privacy engineer, you are tasked with redesigning the architecture to address these concerns. Which of the following architectural approaches BEST integrates Privacy by Design principles for the CareConnect application?

Q6

True or False: Once personal data has been pseudonymized, it is no longer considered personal data under the GDPR and is exempt from its requirements.

Q7

An e-commerce company uses a third-party cloud provider for hosting its entire infrastructure. The contract includes a Data Processing Agreement (DPA). During a routine audit, it is discovered that the cloud provider has been storing backup snapshots in a geographic region not specified in the DPA, a direct violation of the agreement. What is the MOST critical clause in the DPA that gives the e-commerce company leverage to address this issue?

Q8

A privacy engineer is reviewing the metrics for the company's data subject access request (DSAR) process. They observe the following trends over the last quarter: - The number of incoming requests has increased by 50%. - The average time to completion has increased from 15 days to 28 days. - The number of requests requiring manual intervention by the legal team has tripled. Given these metrics, what is the MOST likely root cause of the performance degradation?

Q9Multiple answers

A company is implementing a zero-trust security architecture to better protect personal data stored across its hybrid cloud environment. Which of the following are core principles and technologies required for this implementation? (Select THREE).

Q10

A multinational corporation wants to transfer personal data of its EU employees to its headquarters in the United States for payroll processing. Following recent legal precedents invalidating previous transfer mechanisms, the company seeks the most legally robust and defensible solution for this recurring transfer. Which option provides the highest level of assurance for this specific scenario?